Wednesday, May 8, 2019

Ethical Hacking the three shades White Hat, Black Hat, Gray Hat Research Proposal

Ethical Hacking the three shades White hat, Black Hat, Gray Hat - Research device ExampleThe looker betrothed both qualitative and quantitative research design methods of attacking a computer network. In the conclusion part, the summary was included that summed up the research work. The researcher recommended that on that point is a need for future research to prolong adequate analysis on the way good hackers entrust implement effective risk management protrude, which will enable Internet drug subroutiners or businesses to protect their entropy from hacking activities. INTRODUCTION Ethical hacking as a risk management technique is the use of planming skills in determining vulnerabilities in the computer system. There are varied types of honorable hackers including the White Hat, Black Hat and Grey Hat thus, both focus on building a risk management program effective for eliminating vulnerabilities. The rapid advancement of technology has brought many constructive and signi ficant solutions to the life of people. New areas of research have tremendously increased in e-commerce, electronic activities and information sharing areas. However, with the increased technology advancement, there have been a growing number of cybercrimes and criminal hacking activities. Businesses and other Internet users are nowadays terrified of computer experts who will toss risk management through penetrating into their web server to offer adequate security. Therefore, there is a need for computer science students to advance their ethical hacking techniques in lay to fight against the increasing problems of criminal hacking. Project Goals The project attempts to offer a comprehensive risks management plan effective for eliminating hacking activities in varied organizations. It identifies the risks resulting from hacking and offer effecting hacking methods that hackers will employ to manage organizational risks. It analyses the process of ethical hackings and also attempt t o find out the pros or cons arising from ethical hacking. LITERATURE REVIEW This chapter will employ varied literature materials in order to examine the way the previous scholars have argued about ethical hacking issues. Tiller (2005) offer varied methodologies and unwritten convention that ethical hackers should employ in order to offer the maximum value to companies that want to manage organizational risks. The author reveals the technical aspects of penetration testing in order to address the engagement rules necessary for successful technical tests. Jahankhani (2010) also reveals the way cybercrimes has turn over unity of the biggest problems in many industries across the globe thus, reveals varied aspects including implementation, investigative techniques and criminal intelligence in struggle cybercrimes. The author aimed to educate the academia members, public and private sectors, as well as, students on the way to strike cybercrimes issues. Logan and Clarkson (2005) revea l the significant need to educate computer science students to hack thus enabling them to become experts in managing risks or vulnerabilities arising from hacking activities. HYPOTHESIS Hacking will likely to pose risks such as exposing sensitive user data and risk user privacy thus making information vulnerable to illegitimate use and manipulation. Therefore, it triggers theft of critical business information because important information may be lost in the process hacking. This is because hacking can convert computer into zombies thus contributing to spamming and phishing

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.